CN107102881A - Configuring management method and device for end application - Google Patents
Configuring management method and device for end application Download PDFInfo
- Publication number
- CN107102881A CN107102881A CN201710355902.0A CN201710355902A CN107102881A CN 107102881 A CN107102881 A CN 107102881A CN 201710355902 A CN201710355902 A CN 201710355902A CN 107102881 A CN107102881 A CN 107102881A
- Authority
- CN
- China
- Prior art keywords
- allocation plan
- input information
- external input
- equations
- authentication grade
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of configuring management method and device for end application.Method includes:Obtain the first external input information;According to first external input information, application program is determined from least two allocation plans to be selected is currently configured scheme;The configuration item for running the application program is configured according to the scheme that is currently configured.Realize the quick obtaining of allocation plan under different demands.The configuration item for running application program is configured according to the scheme that is currently configured of determination, the setting efficiency to application program configuration item is improved, improves the experience of user.
Description
Technical field
The present embodiments relate to field of computer technology, more particularly to a kind of configuration management for end application
Method and apparatus.
Background technology
With flourishing for the smart machines such as smart mobile phone, tablet personal computer, increasingly abundanter application enters people
Daily life in.
Existing smart machine operating system is that application program has opened the configuration item that much can customize, if but air exercise
The application program management opened is improper, then can solicited message leakage, electric quantity consumption exception, system operation interim card etc. are many asks
Topic.Therefore, many producers by custom-configuring function to user's open applications program in an operating system to adapt to different use
The configuration management demand at family.
However, in current application program custom-configures function, user needs pair when requiring different allocation plans
Multiple configuration items are configured modification respectively.This configuration mode is very numerous and diverse and scattered, user often probably due to carelessness or
Some wrong settings of person cause application program some functions during normal use to become unavailable.Existing application management
Tactful Consumer's Experience is not good.
The content of the invention
The invention provides a kind of configuring management method for end application, including:
Obtain the first external input information;
According to first external input information, determine that the current of application program is matched somebody with somebody from least two allocation plans to be selected
Put scheme;
The configuration item for running the application program is configured according to the scheme that is currently configured.
Further, described according to first external input information, being determined from least two allocation plans to be selected should
With being currently configured before scheme for program, in addition to:
According to the second external input information, the allocation plan to be selected is generated.
Further, before the first external input information of the acquisition, in addition to:
The 3rd external input information is detected, is authenticated according to the 3rd external input information;
If authentification failure, the allocation plan to be selected is used as using the first kind allocation plan that prestores;
If certification success, the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores.
Further, the Equations of The Second Kind allocation plan is grouped including at least two Equations of The Second Kind allocation plans, and described second
Class allocation plan packet association corresponding with authentication grade;
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
Authentication grade is determined according to the 3rd external input information;
The allocation plan to be selected is used as using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
Further, the Equations of The Second Kind allocation plan is grouped including at least two Equations of The Second Kind allocation plans, and described second
Class allocation plan packet association corresponding with authentication grade;
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
First authentication grade and the second authentication grade are determined according to the 3rd external input information;
The second authentication grade correspondence is obtained from the corresponding Equations of The Second Kind allocation plan packet of first authentication grade
Equations of The Second Kind allocation plan packet be used as the allocation plan to be selected.
Further, the 3rd external input information of the detection, including:Detected by following at least one modes outside the 3rd
Portion inputs information:
Speech detection;
Image detection;
Motion detection.
Present invention also offers a kind of configuration management device for end application, including:
Acquisition module, for obtaining the first external input information;
Processing module, for according to first external input information, being determined from least two allocation plans to be selected should
Scheme is currently configured with program;
Configuration module, is configured for being currently configured scheme according to the configuration item for starting the application program.
Further, the processing module is additionally operable to, according to the second external input information, generate the allocation plan to be selected.
Further, in addition to:
Authentication module, for detecting the 3rd external input information, is authenticated according to the 3rd external input information;If
Authentification failure, the processing module using the first kind allocation plan that prestores specifically for being used as the allocation plan to be selected;If recognizing
Demonstrate,prove successfully, the processing module using the Equations of The Second Kind allocation plan that prestores specifically for being used as the allocation plan to be selected.
Further, the Equations of The Second Kind allocation plan is grouped including at least two Equations of The Second Kind allocation plans, and described second
Class allocation plan packet association corresponding with authentication grade;
The authentication module according to the 3rd external input information specifically for determining authentication grade;The processing module
Specifically for being used as the allocation plan to be selected using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
The present invention applies journey by according to first external input information, being determined from least two allocation plans to be selected
Sequence is currently configured scheme;The configuration item for running the application program is configured according to the scheme that is currently configured, realized
The quick obtaining of allocation plan under different demands.The configuration item for running application program is carried out according to the scheme that is currently configured of determination
Configuration, improves the setting efficiency to application program configuration item, improves the experience of user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs
Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
A kind of flow charts of the Fig. 1 for the present invention for the configuring management method of end application;
Fig. 2 includes a kind of stream for generating allocation plan to be selected for the present invention for the configuring management method of end application
Cheng Tu;
Fig. 3 includes a kind of flow chart of certification for the present invention for the configuring management method of end application;
Fig. 4 is that a kind of implementation of the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores in Fig. 3;
Fig. 5 is that another implementation of the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores in Fig. 3.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
A kind of flow charts of the Fig. 1 for the present invention for the configuring management method of end application.As shown in figure 1, being originally
The method of embodiment can include:
S110, obtains the first external input information;
S120, according to first external input information, determines application program from least two allocation plans to be selected
It is currently configured scheme;
S130, is configured according to the scheme that is currently configured to the configuration item for running the application program.
The first external input information obtained in step S110 shown in Fig. 1 is to be used to treat in step S120 at least two
Arrangement scheme carries out the information of selection, and first external input information is by way of including but is not limited to following at least one
Obtain:
Recognize that the point of touch area on touch-screen touches to make or glide direction acquisition;
Recognize the semantic acquisition in voice messaging.
Allocation plan to be selected is at least two in step S120 shown in Fig. 1, by being carried out to existing optional program
Selection, realizes the quick obtaining of allocation plan under different demands.Scheme is currently configured to operation according to what is determined in step S120
The configuration item of application program is configured, and is improved the setting efficiency to application program configuration item, is improved the experience of user.
Method shown in described Fig. 1 can be every time open application program when carry out, for example detect need start
Step S110-S130 is proceeded by after the instruction of application program, is opened after step S130 configurations are finished with amended configuration item
Move and run the operation program.Thus the demand configured before application program starts every time to application program is met.
Method shown in described Fig. 1 can also be to be carried out during application program is run, for example, detecting needs
Step S110-S130 is proceeded by after the instruction for changing application program configuration item, after after step S130 configurations are finished with modification
Configuration item continue to run with the operation program.Thus meet application program is configured in application program running
Demand.
Fig. 2 includes a kind of stream for generating allocation plan to be selected for the present invention for the configuring management method of end application
Cheng Tu.
As shown in Fig. 2 before step S110, in addition to step S210, according to the second external input information, generation is described
Allocation plan to be selected.
Specifically, the second external input information in step S210 is the information for generating allocation plan to be selected.User
Formulated according to different demands and increase allocation plan to be selected, the embodiment shown in Fig. 2 can provide for user person writes from memory with supplier
Recognize the different conceptual design requirement of scheme.A kind of implementation of embodiment shown in Fig. 2 can be that system ejection sets to be selected
The dialog box of allocation plan, user sets in the dialog box for setting allocation plan to be selected to every configuration item of application program
Put.
In a kind of embodiment that method shown in Fig. 2 is applied to mobile phone terminal, a kind of allocation plan to be selected that user is set
Can be " to prohibit the use of GPRS flows, allow to obtain current address, allow camera access authority, allow microphone access right
Limit ".User clicks on " confirmation " after setting completed, and cell phone system generates the allocation plan to be selected and preserved.Treating arrangement side
User can also treat the name of arrangement scheme during case is set, for example, be named as above-mentioned allocation plan to be selected " outdoor
Usage scenario ".User, will be entitled comprising this at least two allocation plans to be selected got when entering step S220
The allocation plan to be selected of " outdoor usage scenario ".User multiple allocation plans to be selected can be set according to a variety of use demands in case
It is subsequently selected.
On the basis of embodiment illustrated in fig. 1, further, before S110, S301- can also be comprised the following steps
S303, as shown in figure 3, Fig. 3 includes a kind of flow chart of certification for the present invention for the configuring management method of end application:
S301, detects the 3rd external input information, is authenticated according to the 3rd external input information.
S302, if authentification failure, the allocation plan to be selected is used as using the first kind allocation plan that prestores.
S303:If certification success, the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores.
The step of three external input information of the detection, it is chosen as needing to change application program configuration item detecting
Detected in an authenticated time after instruction, be also chosen as the certification after the instruction for needing startup application program is detected
Detected in time.If not detecting effective information in the authenticated time, directly it is judged as authentification failure.It is described
S302 and S303 is corresponding subsequent step under two kinds of different authentication results, should not limit S302's and S303 with its Digital size
Sequencing.
Table 1 is a kind of optional embodiment of first kind allocation plan and Equations of The Second Kind allocation plan of the present invention.
Alternatively, the access right of the first kind allocation plan is less than the access right of the Equations of The Second Kind allocation plan.
For example first kind allocation plan A is chosen as in the illustrated embodiment of table 1:
A1 " prohibits the use of GPRS flows, forbids obtaining current address, forbid camera access authority, forbid microphone to access
Authority, forbid backstage refresh, forbid open bluetooth ",
With, A2 " GPRS flows are prohibitted the use of, forbids obtaining current address, forbids camera access authority, forbids microphone to visit
Authority is asked, allows backstage to refresh, forbid opening bluetooth ";
Equations of The Second Kind allocation plan B is chosen as:
B1 " allows using GPRS flows, allows to obtain current address, forbids camera access authority, forbids microphone to access
Authority, permission backstage refresh, allow to open bluetooth ",
" allow using GPRS flows with, B2, allow to obtain current address, allow camera access authority, allow microphone to visit
Authority is asked, allows backstage to refresh, allow to open bluetooth ".
Table 1
The allocation plan to be selected of different rights is got according to the result of certification, same terminal is used available for multiple users
The embodiment of equipment, can be used for the embodiment of same user's different choice mode.
In embodiment of multiple users using same terminal device, the method shown in Fig. 3 is directed to stranger and keeper
Give different access rights.For the stranger of authentification failure, only the first kind as shown in A1, A2 in table 1 can be used to match somebody with somebody
Put scheme;For the successful keeper of certification, the Equations of The Second Kind allocation plan as shown in B1, B2 in table 1 can be used.It is possible thereby to
Reduce the possibility of terminal device information leakage.
In the embodiment of same user's different choice mode, user can need to limit application program access right
In the case of realized by authentification failure.For example when parent needs the learning software on tablet personal computer being supplied to child resistant,
The result failed by using the authentication mode access authentication of mistake, and the configuration in first kind allocation plan in selection table 1
Option A 2, thus limiting child seeing a film during using application program, play the access rights of the amusement functions such as game.By
This can be in order to user under different scenes use requirement.
The allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores described in S303 in embodiment shown in Fig. 3
At least include but is not limited to following two implementations:
On the basis of embodiment illustrated in fig. 3, the Equations of The Second Kind allocation plan includes at least two Equations of The Second Kind allocation plans
Packet, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade.Wherein, step S303 a kind of possible realization
Side as shown in figure 4, including
S4021, authentication grade is determined according to the 3rd external input information;
S4022, arrangement side is treated using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores described in
Case.
Embodiment shown in Fig. 4 is further finely divided with authentication grade to Equations of The Second Kind allocation plan, is used available for multiple
Family uses the embodiment of same terminal device, can be used for the embodiment of same user's different choice mode.
Table 2 is a kind of optional Equations of The Second Kind allocation plan packet embodiment of the present invention.Same terminal is used in multiple users
In the embodiment of equipment, thus the multiple keepers of multiple authentication grade correspondences provide identical or different for different administrative staff
Allocation plan to be selected.Equations of The Second Kind allocation plan B is grouped B1 and the comprising Equations of The Second Kind allocation plan for example in the illustrated embodiment of table 2
Two class allocation plans are grouped B2.At least include two allocation plans again in the packet of each Equations of The Second Kind allocation plan.
If the authentication grade correspondence Equations of The Second Kind allocation plan packet B1 of user, using allocation plan B11, B12 as described
Allocation plan to be selected.Wherein allocation plan B11 is specially:Forbid accessing database 1, allow bearing data storehouse 2, allow in application
The operation of data is changed in program, allows the operation of output data in the application and allows to carry out network in the application
Connection.
Table 2
Embodiment as shown in table 2 is applied at least two implementations:
One kind is achieved in that:The keeper of the different authentication grade to be selected allocation plan different by obtaining is answered same
With the different database of routine access, the use requirement of different user is realized.
It is another to be achieved in that:Same keeper obtains different allocation plans to be selected by different authentication grades,
Realize the use requirement under the different usage scenarios of same user.
In embodiment illustrated in fig. 4, it is described according to the 3rd external input information determine the method for authentication grade include but
It is not limited to the implementation that table 3, table 4, table 5 are respectively shown in.
In implementation as shown in Table 3 and Table 4, according to the type of the identification object of the 3rd external input information
Determine authentication grade.
Table 3 is a kind of optional authentication grade of the present invention and the type corresponding relation of identification object.
As shown in table 3, the type of the identification object of the 3rd external input information is divided into voice, image and action, root
Authentication grade is determined according to the type difference of identification object.The type of identification object shown in table 3 can be simply by obtaining institute
The sensor of the 3rd external input information is stated to determine:Microphone correspondence voice class, camera correspondence image class, touch-screen correspondence
Act class.Sensor according to the 3rd external input information is obtained can quickly determine the identification of the 3rd external input information
The type of object.In the implementation shown in table 3, it will act that the corresponding authentication grade B3 of class is default to be set to highest certification etc.
Level.Therefore by acting during the success of class access authentication, the allocation plan to be selected for accessing top secret data base authority can be obtained.
Table 3
Authentication grade | The type of identification object |
B1 | Voice class |
B2 | Image class |
B3 | Act class |
Table 4 is the optional another authentication grade of the present invention and the type corresponding relation of identification object.
As shown in table 4, the type of the identification object of the 3rd external input information is divided into fingerprint recognition class, recognition of face
Class and iris recognition class, authentication grade is determined according to the type of identification object difference.Due to fingerprint image, facial image and rainbow
The characteristics of image of film image has obvious difference, therefore the illustrated embodiment of table 4 is according to the 3rd external input information of acquisition
Characteristics of image determine the type of identification object.In implementation shown in table 4, alternatively by the corresponding certification of fingerprint recognition class
Grade B1 is default to be set to highest authentication grade.When therefore by the success of fingerprint recognition type access authentication, access can be obtained most
The allocation plan to be selected of high confidential data storehouse authority.
Table 4
Authentication grade | The type of identification object |
B1 | Fingerprint recognition class |
B2 | Recognition of face class |
B3 | Iris recognition class |
Table 5 is another optional authentication grade of the present invention and the type corresponding relation of identification object.As shown in table 5
In implementation, authentication grade is determined according to the content of the identification object of the 3rd external input information.
As shown in table 5, the content " A001 ", " B001 " and " C001 " of the identification object of the 3rd external input information is all
It is that can authenticate successful password, but different passwords have corresponded to different authentication grades.
Acquisition modes of the implementation not to password shown in table 5 make a distinction.For example in three times certifications pass through respectively
It is " C001 " the 3rd external input information that fingerprint image, facial image or iris image identification, which obtain content, all corresponds to certification etc.
Level B3.In implementation shown in table 5, alternatively " A001 " corresponding authentication grade B1 is preset and is set to highest authentication grade.
When therefore being succeeded by either type input content for the 3rd external input information access authentication of " A001 ", it can be accessed
The allocation plan to be selected of top secret data base authority.
Table 5
Authentication grade | The content of identification object |
B1 | A001 |
B2 | B001 |
B3 | C001 |
Another implementation that Fig. 5 is step S303 in the improvement on the basis of embodiment illustrated in fig. 3, in particular Fig. 3.
Table 6 is a kind of optional embodiment of first authentication grade and the second authentication grade of the present invention.
In embodiment as shown in Fig. 5 and table 6, the Equations of The Second Kind allocation plan include Equations of The Second Kind allocation plan packet C11,
C12, C21, C22, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade.
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
Step S5021, the first authentication grade and the second authentication grade are determined according to the 3rd external input information;
Step S5022, obtains described second in being grouped from the corresponding Equations of The Second Kind allocation plan of first authentication grade and recognizes
The corresponding Equations of The Second Kind allocation plan packet of card grade is used as the allocation plan to be selected.
In the implementation shown in Fig. 5 and table 6, if user inputs the 3rd outside input in the way of fingerprint recognition
Information, and the 3rd external input information correspondence password " A001 ", then,
As shown in table 6, first according to the type " fingerprint recognition class " of the 3rd external input information identification object, it is determined that
First authentication grade is R11;According to the content " A001 " of the 3rd external input information identification object, second certification etc. is determined
Level is C11;
The corresponding Equations of The Second Kind allocation plan packets of second authentication grade R21 in first authentication grade R11 are obtained by the correspondence of table 6
For C11.
Table 6
The 3rd external input information is detected in the step S301 as described in Fig. 3-5, including:Examined by following at least one modes
Survey the 3rd external input information:
Speech detection, speech detection further comprise but be not limited to semantic information detection, volume detection, tone color detection and/
Or pitch detection.
Image detection, image detection further comprises but is not limited to facial features localization, iris feature is detected, fingerprint characteristic
Detection, numerical characteristic detection and/or bar code detection.
Motion detection, motion detection further comprises but is not limited to displacement detecting and/or pressure position detection.The present invention is also
A kind of configuration management device for end application is provided, as a kind of implementation, including:
Acquisition module, for obtaining the first external input information;
Processing module, for according to first external input information, being determined from least two allocation plans to be selected should
Scheme is currently configured with program;
Configuration module, is configured for being currently configured scheme according to the configuration item for starting the application program.
The processing module is additionally operable to, according to the second external input information, generate the allocation plan to be selected.
The configuration management device for end application also includes:
Authentication module, for detecting the 3rd external input information, is authenticated according to the 3rd external input information;If
Authentification failure, the processing module using the first kind allocation plan that prestores specifically for being used as the allocation plan to be selected;If recognizing
Demonstrate,prove successfully, the processing module using the Equations of The Second Kind allocation plan that prestores specifically for being used as the allocation plan to be selected.
The Equations of The Second Kind allocation plan is grouped including at least two Equations of The Second Kind allocation plans, and the Equations of The Second Kind allocation plan
Packet association corresponding with authentication grade;
The authentication module according to the 3rd external input information specifically for determining authentication grade;The processing module
Specifically for being used as the allocation plan to be selected using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (10)
1. a kind of configuring management method for end application, it is characterised in that including:
Obtain the first external input information;
According to first external input information, the side of being currently configured of application program is determined from least two allocation plans to be selected
Case;
The configuration item for running the application program is configured according to the scheme that is currently configured.
2. according to the method described in claim 1, it is characterised in that described according to first external input information, from least
Being currently configured before scheme for application program is determined in two allocation plans to be selected, in addition to:
According to the second external input information, the allocation plan to be selected is generated.
3. method according to claim 1 or 2, it is characterised in that before the external input information of acquisition first, also wrap
Include:
The 3rd external input information is detected, is authenticated according to the 3rd external input information;
If authentification failure, the allocation plan to be selected is used as using the first kind allocation plan that prestores;
If certification success, the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores.
4. method according to claim 3, it is characterised in that the Equations of The Second Kind allocation plan includes at least two Equations of The Second Kind
Allocation plan is grouped, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade;
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
Authentication grade is determined according to the 3rd external input information;
The allocation plan to be selected is used as using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
5. method according to claim 3, it is characterised in that the Equations of The Second Kind allocation plan includes at least two Equations of The Second Kind
Allocation plan is grouped, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade;
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
First authentication grade and the second authentication grade are determined according to the 3rd external input information;
Second authentication grade corresponding the is obtained from the packet of first authentication grade corresponding Equations of The Second Kind allocation plan
The packet of two class allocation plans is used as the allocation plan to be selected.
6. method according to claim 3, it is characterised in that the external input information of detection the 3rd, including:Under
State at least one mode and detect the 3rd external input information:
Speech detection;
Image detection;
Motion detection.
7. a kind of configuration management device for end application, it is characterised in that including:
Acquisition module, for obtaining the first external input information;
Processing module, for according to first external input information, determining to apply journey from least two allocation plans to be selected
Sequence is currently configured scheme;
Configuration module, is configured for being currently configured scheme according to the configuration item for starting the application program.
8. device according to claim 7, it is characterised in that the processing module is additionally operable to be believed according to the second outside input
Breath, generates the allocation plan to be selected.
9. the device according to claim 7 or 8, it is characterised in that also include:
Authentication module, for detecting the 3rd external input information, is authenticated according to the 3rd external input information;If certification
Failure, the processing module using the first kind allocation plan that prestores specifically for being used as the allocation plan to be selected;If certification into
Work(, the processing module using the Equations of The Second Kind allocation plan that prestores specifically for being used as the allocation plan to be selected.
10. device according to claim 9, it is characterised in that the Equations of The Second Kind allocation plan includes at least two second
Class allocation plan is grouped, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade;
The authentication module according to the 3rd external input information specifically for determining authentication grade;The processing module is specific
For being used as the allocation plan to be selected using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710355902.0A CN107102881A (en) | 2017-05-19 | 2017-05-19 | Configuring management method and device for end application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710355902.0A CN107102881A (en) | 2017-05-19 | 2017-05-19 | Configuring management method and device for end application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107102881A true CN107102881A (en) | 2017-08-29 |
Family
ID=59669015
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710355902.0A Pending CN107102881A (en) | 2017-05-19 | 2017-05-19 | Configuring management method and device for end application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107102881A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109670294A (en) * | 2018-12-28 | 2019-04-23 | Tcl移动通信科技(宁波)有限公司 | Mobile terminal multifile sorting processing method, mobile terminal and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102855286A (en) * | 2012-08-07 | 2013-01-02 | 东莞宇龙通信科技有限公司 | Mobile terminal and method for searching application programs in mobile terminal |
CN102932518A (en) * | 2012-10-30 | 2013-02-13 | 广东欧珀移动通信有限公司 | User login/switching method and system, and mobile terminal |
CN103870128A (en) * | 2014-04-08 | 2014-06-18 | 联想(北京)有限公司 | Control method of electronic equipment, control device and electronic equipment |
CN104731611A (en) * | 2013-12-24 | 2015-06-24 | 联芯科技有限公司 | Mobile terminal operation mode configuring method and system based on application programs |
CN106203015A (en) * | 2016-06-30 | 2016-12-07 | 北京奇虎科技有限公司 | The collocation method of application program, device and terminal unit |
CN106201484A (en) * | 2016-06-30 | 2016-12-07 | 北京奇虎科技有限公司 | The collocation method of application program, device and terminal unit |
CN106295296A (en) * | 2016-08-04 | 2017-01-04 | 深圳市金立通信设备有限公司 | A kind of startup method of application program and terminal |
-
2017
- 2017-05-19 CN CN201710355902.0A patent/CN107102881A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102855286A (en) * | 2012-08-07 | 2013-01-02 | 东莞宇龙通信科技有限公司 | Mobile terminal and method for searching application programs in mobile terminal |
CN102932518A (en) * | 2012-10-30 | 2013-02-13 | 广东欧珀移动通信有限公司 | User login/switching method and system, and mobile terminal |
CN104731611A (en) * | 2013-12-24 | 2015-06-24 | 联芯科技有限公司 | Mobile terminal operation mode configuring method and system based on application programs |
CN103870128A (en) * | 2014-04-08 | 2014-06-18 | 联想(北京)有限公司 | Control method of electronic equipment, control device and electronic equipment |
CN106203015A (en) * | 2016-06-30 | 2016-12-07 | 北京奇虎科技有限公司 | The collocation method of application program, device and terminal unit |
CN106201484A (en) * | 2016-06-30 | 2016-12-07 | 北京奇虎科技有限公司 | The collocation method of application program, device and terminal unit |
CN106295296A (en) * | 2016-08-04 | 2017-01-04 | 深圳市金立通信设备有限公司 | A kind of startup method of application program and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109670294A (en) * | 2018-12-28 | 2019-04-23 | Tcl移动通信科技(宁波)有限公司 | Mobile terminal multifile sorting processing method, mobile terminal and storage medium |
CN109670294B (en) * | 2018-12-28 | 2022-08-05 | Tcl移动通信科技(宁波)有限公司 | Mobile terminal multi-file classification processing method, mobile terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100901238B1 (en) | Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects | |
JP4939121B2 (en) | Methods, systems, and programs for sequential authentication using one or more error rates that characterize each security challenge | |
EP3214798B1 (en) | Identity authentication method and device | |
Conti et al. | Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call | |
US8079079B2 (en) | Multimodal authentication | |
CN104077516A (en) | Biometric authentication method and terminal | |
US10795978B2 (en) | Method and device for identity authentication | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN107864144A (en) | Obtain method and device, computer installation and the storage medium of dynamic password | |
CN105868970A (en) | Authentication method and electronic device | |
CN108241999A (en) | A kind of generation method of invoice information, apparatus and system | |
CN105868611A (en) | Biological-information authentication method and device and mobile terminal | |
CN110399708A (en) | A kind of dual-identity authentication method, apparatus and electronic equipment | |
CN104751350B (en) | A kind of method for information display and terminal | |
CN108647510A (en) | Application program access method and device | |
US20200201977A1 (en) | Method for authenticating a first user and corresponding first device and system | |
CN107742073A (en) | Information displaying method, device, computer installation and computer-readable recording medium | |
CN107102881A (en) | Configuring management method and device for end application | |
Kadëna et al. | Adoption of biometrics in mobile devices | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
CN105871840B (en) | A kind of certificate management method and system | |
CN109726636A (en) | User ID authentication method and device, storage medium and electronic equipment | |
CN110516427A (en) | Auth method, device, storage medium and the computer equipment of terminal user | |
CN110399046A (en) | The processing method of candidate item, device, equipment and storage medium in input method | |
CN108563938A (en) | The fingerprint authentication method and device of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170829 |